Research Article | | Peer-Reviewed

Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats

Received: 9 November 2025     Accepted: 20 December 2025     Published: 27 December 2025
Views:       Downloads:
Abstract

Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such as the 2016 Bangladesh Bank heist and recurring data breaches, reveal that the nation’s security challenges extend beyond technology. This article applies a constructivist theoretical framework to argue that cybersecurity in Bangladesh should be socially constructed through shared meanings, political narratives, and institutional identities rather than determined solely by material capacity. Drawing on the foundational insights of Onuf, Wendt, and Finnemore, it contends that the country’s laws and policies, such as the Information and Communication Technology (ICT) Act (2006) and the Digital Security Act (2018), reflect the internalisation of state-centric norms that privilege control and reputation management over transparency and citizen trust. Through interpretive analysis of policy documents, legislative instruments, and media discourses, the study demonstrates that the prevailing cybersecurity narrative in Bangladesh equates resilience with regime stability and technological modernity. Constructivist reasoning reframes this narrative by highlighting how institutional legitimacy, social trust, and professional identity shape security behaviour. Further, research shows that international frameworks, such as the International Organisation for Standardisation/International Electrotechnical Commission (ISO/IEC) 27001 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework, contribute to global norm diffusion but achieve a long-term impact only when locally internalised. Ultimately, the study concludes that Bangladesh’s cybersecurity resilience depends not merely on technological and legislative reforms but on reconstructing the social meanings that underpin governance. By embedding openness, inclusivity, and accountability into institutional culture, Bangladesh can transform cybersecurity from a domain of control into a collective practice of trust and responsibility.

Published in Humanities and Social Sciences (Volume 13, Issue 6)
DOI 10.11648/j.hss.20251306.19
Page(s) 590-599
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2025. Published by Science Publishing Group

Keywords

Bangladesh, Cybersecurity, Constructivism, Digital Security Act, ICT Act, Governance, Norm Diffusion

References
[1] Ministry of Science and Information and Communication Technology. The Information and Communication Technology (ICT) Act, Government of the People’s Republic of Bangladesh, 2006. Available from:
[2] Ministry of Law, Justice and Parliamentary Affairs. Digital Security Act, Government of the People’s Republic of Bangladesh, 2018. Available from:
[3] National Cyber Security Index. Country profile: Bangladesh. e?Governance Academy, 2021. Available from:
[4] Waxman, M. C. Cyber?Attacks and the Use of Force: Back to the Future of Article 2(4), Yale Journal of International Law. 2011, 36, 421-459.
[5] Wendt, A. Anarchy is What States Make of it: The Social Construction of Power Politics, International Organization. 1992, 46(2), 391-425.
[6] Wheeler, D. A., Larsen, G. N. Techniques for Cyber?Attack Attribution, Institute for Defense Analyses. 2003. Available from:
[7] Lipson, H. F. Tracking and Tracing Cyber?Attacks: Technical Challenges and Global Policy Issues. Special Report, CMU/SEI-2002-SR-009, Carnegie Mellon University, 2002, 1-71. Available from:
[8] Onuf, N. World of Our Making: Rules and Rule in Social Theory and International Relations. Columbia, South Carolina: University of South Carolina Press, 1989, pp. 1-341.
[9] Hough, P. Understanding Global Security. 3rd ed. London: Routledge; 2013, pp. 1-490.
[10] The Daily Star, “2 Govt Websites Hacked”, July 2013. Available from:
[11] Wendt, A. Social Theory of International Politics. Cambridge: Cambridge University Press; 1999, pp. 1-429.
[12] Finnemore, M. National Interests in International Society. Ithaca, NY: Cornell University Press; 1996, pp. 1-180.
[13] Katzenstein, P. J. The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press; 1996, pp. 1-562.
[14] Kabir, S. Global ICT Indicators’ Status in Bangladesh, Bangladesh Bureau of Statistics. 2014, 1-15.
[15] National Institute of Standards and Technology. Cybersecurity Framework 2.0. Gaithersburg, MD: NIST; 2024, pp. 1-27. Available from:
[16] ISO/IEC 27001: 2022. Information Security, Cybersecurity and Privacy Protection — Information Security Management Systems — Requirements. 2022, Edition 3, 1-19. Available from:
[17] Finnemore, M., Sikkink, K. International Norm Dynamics and Political Change. International Organization. 1998, 52(4), 887-917.
[18] Ejinsight, “Hackers Lurked in Bangladesh Central Bank’s Servers for Weeks”, March 2016. Available from:
[19] Khan, M. S., Barua, S. The State and Threats of Information Security in the Banking Sector of Bangladesh: Policy Required, Bangladesh Journal of MIS. 2009, 1(2), 1-27.
[20] Rahman, S. ATM Frauds Rattle Banks, Customers, The Daily Star, February 2016. Available from:
[21] Bergman, D. Bangladesh Bank Governor Resigns after $81m Hack, Aljazeera, March 2016. Available from:
[22] Hossain, M. Violence against women rises 74%, News Network, April 2016. Available from:
[23] Sarker, P., Hasan, M., Akhter, R., Sakir, S. Women’s Rights, Gender and ICTs in Bangladesh, Global Information Society Watch. 2013, 70-72. Available from:
[24] Ministry of Science and Information and Communication Technology. National ICT Policy 2009, Government of the People’s Republic of Bangladesh, 2009. Available from:
[25] United Nations Development Programme. Access to Information (A2I) Programme ‘Strategic Priorities of Digital Bangladesh’, 2011, 1-265. Available from:
[26] Hammer, M., Champy, J. Reengineering the Corporation: A Manifesto for Business Revolution. New York: HarperCollins Publishers, 1993, pp. 1-223.
[27] The World Bank. Making Services Work for Poor People, World Development Report, pp. 1-271. Available from:
[28] Badruzzaman, M. Controversial issues of section-57 of the ICT Act, 2006: A Critical Analysis and Evaluation, Journal of Humanities and Social Science. 2016, 21(1), 62-71.
Cite This Article
  • APA Style

    Ferdous, S. (2025). Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats. Humanities and Social Sciences, 13(6), 590-599. https://doi.org/10.11648/j.hss.20251306.19

    Copy | Download

    ACS Style

    Ferdous, S. Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats. Humanit. Soc. Sci. 2025, 13(6), 590-599. doi: 10.11648/j.hss.20251306.19

    Copy | Download

    AMA Style

    Ferdous S. Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats. Humanit Soc Sci. 2025;13(6):590-599. doi: 10.11648/j.hss.20251306.19

    Copy | Download

  • @article{10.11648/j.hss.20251306.19,
      author = {Sahely Ferdous},
      title = {Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats},
      journal = {Humanities and Social Sciences},
      volume = {13},
      number = {6},
      pages = {590-599},
      doi = {10.11648/j.hss.20251306.19},
      url = {https://doi.org/10.11648/j.hss.20251306.19},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.hss.20251306.19},
      abstract = {Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such as the 2016 Bangladesh Bank heist and recurring data breaches, reveal that the nation’s security challenges extend beyond technology. This article applies a constructivist theoretical framework to argue that cybersecurity in Bangladesh should be socially constructed through shared meanings, political narratives, and institutional identities rather than determined solely by material capacity. Drawing on the foundational insights of Onuf, Wendt, and Finnemore, it contends that the country’s laws and policies, such as the Information and Communication Technology (ICT) Act (2006) and the Digital Security Act (2018), reflect the internalisation of state-centric norms that privilege control and reputation management over transparency and citizen trust. Through interpretive analysis of policy documents, legislative instruments, and media discourses, the study demonstrates that the prevailing cybersecurity narrative in Bangladesh equates resilience with regime stability and technological modernity. Constructivist reasoning reframes this narrative by highlighting how institutional legitimacy, social trust, and professional identity shape security behaviour. Further, research shows that international frameworks, such as the International Organisation for Standardisation/International Electrotechnical Commission (ISO/IEC) 27001 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework, contribute to global norm diffusion but achieve a long-term impact only when locally internalised. Ultimately, the study concludes that Bangladesh’s cybersecurity resilience depends not merely on technological and legislative reforms but on reconstructing the social meanings that underpin governance. By embedding openness, inclusivity, and accountability into institutional culture, Bangladesh can transform cybersecurity from a domain of control into a collective practice of trust and responsibility.},
     year = {2025}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats
    AU  - Sahely Ferdous
    Y1  - 2025/12/27
    PY  - 2025
    N1  - https://doi.org/10.11648/j.hss.20251306.19
    DO  - 10.11648/j.hss.20251306.19
    T2  - Humanities and Social Sciences
    JF  - Humanities and Social Sciences
    JO  - Humanities and Social Sciences
    SP  - 590
    EP  - 599
    PB  - Science Publishing Group
    SN  - 2330-8184
    UR  - https://doi.org/10.11648/j.hss.20251306.19
    AB  - Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such as the 2016 Bangladesh Bank heist and recurring data breaches, reveal that the nation’s security challenges extend beyond technology. This article applies a constructivist theoretical framework to argue that cybersecurity in Bangladesh should be socially constructed through shared meanings, political narratives, and institutional identities rather than determined solely by material capacity. Drawing on the foundational insights of Onuf, Wendt, and Finnemore, it contends that the country’s laws and policies, such as the Information and Communication Technology (ICT) Act (2006) and the Digital Security Act (2018), reflect the internalisation of state-centric norms that privilege control and reputation management over transparency and citizen trust. Through interpretive analysis of policy documents, legislative instruments, and media discourses, the study demonstrates that the prevailing cybersecurity narrative in Bangladesh equates resilience with regime stability and technological modernity. Constructivist reasoning reframes this narrative by highlighting how institutional legitimacy, social trust, and professional identity shape security behaviour. Further, research shows that international frameworks, such as the International Organisation for Standardisation/International Electrotechnical Commission (ISO/IEC) 27001 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework, contribute to global norm diffusion but achieve a long-term impact only when locally internalised. Ultimately, the study concludes that Bangladesh’s cybersecurity resilience depends not merely on technological and legislative reforms but on reconstructing the social meanings that underpin governance. By embedding openness, inclusivity, and accountability into institutional culture, Bangladesh can transform cybersecurity from a domain of control into a collective practice of trust and responsibility.
    VL  - 13
    IS  - 6
    ER  - 

    Copy | Download

Author Information
  • International Studies, Macquarie University, Sydney, Australia

  • Sections